Spelling suggestions: "subject:"biometric technologies"" "subject:"cliometric technologies""
1 |
Nekilnojamojo turto įmonės darbo efektyvumo didinimas naudojant biometrinę pelytę / Improvement of labour productivity using a biometric mouse in real estate companyLaurinavičiūtė, Viktorija 15 June 2009 (has links)
Baigiamajame magistro darbe nagrinėjamas nekilnojamojo turto įmonių darbuotojų darbo efektyvumas ir jo didinimo galimybės panaudojant naujausias technologijas – biometrinę kompiuterio pelytę bei VGTU studentų ir dėstytojų sukurtą internetinę ekspertinę sistemą, duodančią patarimus darbuotojų našumui didinti. Darbe apibendrintai aprašomas Lietuvos ūkio darbo našumas, jo pasikeitimai per pastaruosius metus, bei veiksniai, turintys didžiausią įtaką darbo našumui. Taip pat darbe aprašomos biometrinės technologijos, apžvelgiamas jų panaudojimas nekilnojamojo turto sektoriuje ir galimybė jas pritaikyti darbo efektyvumui didinti. Atlikus stebėjimus biometrine kompiuterio pelyte ir nustačius didžiausią įtaką darbuotojų našumui darančius veiksnius, remiantis A. Maslowo poreikių teorija buvo sukurta ekspertinė darbo našumo didinimo sistema. Išanalizavus darbo su biometrine pelyte ir sukurta ekspertine sistema rezultatus, darbo gale pateikiamos darbo išvados ir pasiūlymai. / The labour productivity problem and possibility to improve labour productivity by using biometric technologies and web-based expert system, developed by students and academics of VGTU is analyzed in this thesis. Summarized description of the labour productivity in general, its progress during few past years in Lithuania and factors that make the biggest influence on the level of labour productivity are described. Also the work contains overview of the biometric systems, usage of them in real estate and the possibility to increase labour productivity. After making observations during work with biometric mouse and identifying factors that affect productivity the most, the expert system, based on the A.Maslows hierarchy of needs was developed. Conclusion and suggestions were made after performing the analysis of the results of working with the biometric mouse and web-based expert system.
|
2 |
Homogeneous cognitive based biometrics for static authenticationMohamed, Omar Hamdy 01 February 2011 (has links)
In today's globally expanding business world, protecting the identity and transactions of online consumers is crucial for any company to reach out for new markets. This directs digital information technologies towards the adoption of stronger and more secure authentication schemes. Increasingly, such biometric-based user authentication systems have proven superiority over the traditional ones (such as username/password).
Unfortunately, despite the significant advances accomplished in developing biometric technologies, there are several barriers to their wide-scale deployment and application for Internet security. Additionally, introducing new biometrics faces similar barriers and challenges such as expensive equipment, or low-precision sensor technologies.
In this research, we propose a novel biometric system for static user authentication, that homogeneously combines mouse dynamics, visual search capability and short-term memory effect. The proposed system introduces the visual search capability, and short-term memory effect to the biometric-based security world for the first time. The use of mouse for its dynamics, and as an input sensor for the other two biometrics, means no additional hardware is required. Experimental evaluation demonstrated the system's effectiveness using variable or one-time passwords. All of these attributes qualify the proposed system to be effectively deployed as a static Web-authentication mechanism.
Extensive experimentation was done using 2740 sessions collected from 274 users. Two classification mechanisms were used to measure the performance. Using the first of these, a specially devised neural network model called Divide & Select, an EER of 5.7% was achieved. A computational statistics model showed a higher classification performance; a statistical classifier design called Weighted-Sum produced an EER of 2.1%.
The performance enhancement produced as a result of changing the analysis model suggests that with further analysis, performance could be enhanced to an industry standard level. Additionally, we presented a Proof of Concept (POC) system to show the system packaging practicality.
|
3 |
Privacy Concerns Regarding the Use of Biometrics in Trusted Traveler ProgramsMerlano, Shari 01 January 2016 (has links)
One of the objectives of the U.S. government is to balance the individual’s right to privacy and national security interests. Trusted Traveler programs create a risk-based security model where the traveling public is categorized into low or high risk. There are, however, some privacy concerns related to the acceptance of the use of biometric technology in the adoption of expedited security screening procedures in commercial airports. The theoretical construct of this case study of the TSA Pre-Check Program is based on Ajzen and Fischbein’s theory of reasoned action, specifically through Davis’ technology acceptance model. The purpose of this case study was to explore the perceptions of the traveling public regarding the protection of privacy and the use of biometric technologies. Data for this study included 325 social media postings, 50 privacy complaints reported to the Department of Homeland Security between 2009 and 2014, and publicly available data from the Government Accountability Office about expedited screening for the years 2011 – 2014. Data were coded into a priori themes and then subjected to a content analysis procedure. Findings indicate that the traveling public generally support expedited security screening and consent to waiving certain privacy rights in order to facilitate expedited screening. Complaints from travelers were also primarily related to wait times and secondary screening, and not privacy concerns. The positive social change implications stemming from this study include recommendations to the TSA to expand the Trusted Traveler programs such that the primary concern of the traveling public, reduction of wait time is balanced against privacy concerns about the collection of biometric data as part of a measured response to aviation security.
|
4 |
Le contrôle des frontières et le régime des visas dans l'Union Européenne : sécurité intérieure ou prérogative de souveraineté ? / Border control and visa regime in the European Union : Internal Security or sovereign prerogative? : ¿Seguridad interior o prerrogativa soberana?Rodriguez Bautista, Daniela 10 January 2017 (has links)
Portant sur le contrôle des frontières et la gestion des flux migratoires au sein de l’Union européenne, le présent travail a pour objectif de déterminer si le pouvoir discrétionnaire des États membres survient comme une prérogative de souveraineté pour des raisons de sécurité intérieure à l’Union, ou bien si cette prérogative souveraine se consolide à travers la sécurité intérieure. Ce travail permet ainsi d’illustrer l’importance du rôle joué par la Cour de justice de l’Union européenne dans l’harmonisation de l’Union sur ces questions. Concrètement, cette étude décrit en détail la façon dont « l’imprécision » du cadre juridique de l’Union autorise une marge d’appréciation aux autorités nationales dans l’interprétation des faits, conformément aux dispositions générales du cadre juridique. Ainsi, le pouvoir discrétionnaire avec lequel les autorités consulaires et frontalières des États membres appliquent cette législation, laisse un doute raisonnable sur la mise en œuvre adéquate du cadre juridique. En d’autres termes, les autorités des États membres disposent de facultés discrétionnaires, qui leur permettent d’adopter des solutions ad hoc afin de combler les vides laissés par la législation européenne. Par conséquent, l’intervention de la Cour de justice s’avère indispensable afin de garantir une mise en application uniforme du droit dérivé de l’Union. / In the field of the borders control and migration flows management, the aim of this analyse is determine whether Member States discretion arises as a prerogative of sovereignty for reasons of internal security of the Union, or whether this sovereign prerogative is consolidated through internal security. This analyse also serves to illustrate the importance of the work of the Court of Justice of the European Union to harmonize the EU legislation in this area. Specifically, this study details how the "imprecision" of the EU legal framework permits discretion to national authorities in the interpretation of facts, in accordance with the general provisions of the legal framework. So, discretionary power with which consular and border authorities of the Member States apply this legislation, leaves a reasonable doubt on the proper implementation of the legal framework. In other terms, authorities of the Member States have discretionary power, which allow them to adopt ad hoc solutions to fill the gaps left by European legislation. Consequently, intervention of the Court of Justice is essential in order to ensure a uniform application of the Union's secondary legislation. / El presente trabajo tiene por objeto de estudio determinar, en el ámbito del control de fronteras y la gestión de los flujos migratorios, por una parte, si la discrecionalidad de los Estados miembros surge por cuestiones que atañen a la seguridad interior de la Unión o por una prerrogativa soberana, o bien si la discrecionalidad se consolida a través de la seguridad interior. Y, por otra parte, destacar la importancia de la labor del Tribunal de Justicia de la Unión Europea para armonizar la normativa de la Unión en este ámbito. En concreto, este estudio describe con detalle como la “imprecisión” del ordenamiento de la Unión otorga un libre margen de apreciación a la autoridad nacional para interpretar los hechos conforme al precepto general del ordenamiento. De modo que, la discrecionalidad con la que esta legislación es aplicada por las autoridades consulares y fronterizas de los Estados miembros deja dudas razonables acerca de la correcta aplicación del ordenamiento. En otros términos, las autoridades de los Estados miembros disponen de facultades discrecionales que les permiten adoptar soluciones ad hoc para llenar los vacíos dejados por la legislación europea. Por lo tanto, la intervención del Tribunal de Justicia es indispensable para garantizar la aplicación uniforme del Derecho derivado de la Unión.
|
5 |
Facial and keystroke biometric recognition for computer based assessmentsAdetunji, Temitope Oluwafunmilayo 12 1900 (has links)
M. Tech. (Department of Information Technology, Faculty of Applied and Computer Sciences), Vaal University of Technology. / Computer based assessments have become one of the largest growing sectors in both nonacademic
and academic establishments. Successful computer based assessments require
security against impersonation and fraud and many researchers have proposed the use of
Biometric technologies to overcome this issue. Biometric technologies are defined as a
computerised method of authenticating an individual (character) based on behavioural and
physiological characteristic features. Basic biometric based computer based assessment
systems are prone to security threats in the form of fraud and impersonations. In a bid to
combat these security problems, keystroke dynamic technique and facial biometric
recognition was introduced into the computer based assessment biometric system so as to
enhance the authentication ability of the computer based assessment system. The keystroke
dynamic technique was measured using latency and pressure while the facial biometrics was
measured using principal component analysis (PCA). Experimental performance was carried
out quantitatively using MATLAB for simulation and Excel application package for data
analysis. System performance was measured using the following evaluation schemes: False
Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error Rate (EER) and Accuracy
(AC), for a comparison between the biometric computer based assessment system with and
without the keystroke and face recognition alongside other biometric computer based
assessment techniques proposed in the literature. Successful implementation of the proposed
technique would improve computer based assessment’s reliability, efficiency and
effectiveness and if deployed into the society would improve authentication and security
whilst reducing fraud and impersonation in our society.
|
Page generated in 0.0886 seconds